Free 312-50v13 Exam Braindumps

Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs.

What type of malware did the attacker use to bypass the company’s application whitelisting?

  1. File-less malware
  2. Zero-day malware
  3. Phishing malware
  4. Logic bomb malware

Answer(s): A



Dorian is sending a digitally signed email to Poly. With which key is Dorian signing this message and how is Poly validating it?

  1. Dorian is signing the message with his public key, and Poly will verify that the message came from Dorian by using Dorian’s private key.
  2. Dorian is signing the message with Poly’s private key, and Poly will verify that the message came from Dorian by using Dorian’s public key.
  3. Dorian is signing the message with his private key, and Poly will verify that the message came from Dorian by using Dorian’s public key.
  4. Dorian is signing the message with Poly’s public key, and Poly will verify that the message came from Dorian by using Dorian’s public key.

Answer(s): C



Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL www.bank.com, the website is displayed, but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the site is not secure and the web address appears different.

What type of attack he is experiencing?

  1. DHCP spoofing
  2. DoS attack
  3. ARP cache poisoning
  4. DNS hijacking

Answer(s): D



Boney, a professional hacker, targets an organization for financial benefits. He performs an attack by sending his session ID using an MITM attack technique. Boney first obtains a valid session ID by logging into a service and later feeds the same session ID to the target employee. The session ID links the target employee to Boney’s account page without disclosing any information to the victim. When the target employee clicks on the link, all the sensitive payment details entered in a form are linked to Boney’s account.

What is the attack performed by Boney in the above scenario?

  1. Forbidden attack
  2. CRIME attack
  3. Session donation attack
  4. Session fixation attack

Answer(s): D






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts